Security Market Segment LS
Friday, 11 May 2018 09:29

NSA exploit that powered WannaCry used much more these days

The WannaCry ransomware caused havoc in many parts of the world. The WannaCry ransomware caused havoc in many parts of the world. Pixabay

A year after a leaked NSA Windows exploit known as EternalBlue was used to create the WannaCry ransomware that caused chaos around the world, a security researcher says it is being used more than ever by attackers in crafting threats.

Ondrej Kubovič of the Slovakian security firm ESET said in a blog post that while WannaCry was rarely seen these days, EternalBlue was still posing a threat to both patched and unpatched systems.

He cited the company's telemetry that showed the popularity of the exploit, one of many crafted by the NSA and leaked on the Web in April 2016 by a group known as the Shadow Brokers, had been growing over the last few months, with a recent spike being even bigger that its peaks in 2017.

EternalBlue exploits a flaw in an obsolete version of Microsoft's implementation of the Server Message Block protocol through port 445; it was patched by the company a month before the exploit was leaked. To this day, there is no clue as to the identity of the Shadow Brokers.

"Black hats scan the Internet for exposed SMB ports, and if found, (they) launch the exploit code," Kubovič wrote.

If the attacker found a vulnerable system, then a payload of his/her choice would be run on the target and this was how WannaCry was distributed across networks.

WannaCry was stopped in its tracks when British security researcher Marcus Hutchins registered a domain he had found in its source code; the malware had been programmed to check this domain, and continue spreading if it could not access the domain.

Kubovič said EternalBlue had a quiet period after the ravages of WannaCry, with detections dropping to a few hundred a day. But since September 2017, the use of the exploit had continued to grow and had reached new heights in mid-April.

"One possible explanation for the latest peak is the Satan ransomware campaign seen around those dates, but it could be connected to other malicious activities as well," he said.

Apart from WannaCry, EternalBlue has also powered the Petya (aka NotPetya, Nyetya or Golden Eye) ransomware in June 2017 and the BadRabbit ransomware campaign in the last three months of 2017. It was also used by the Sednit (aka APT28, Fancy Bear and Sofacy) cyber-espionage group to attack Wi-Fi networks in European hotels.

"This exploit and all the attacks it has enabled so far highlight the importance of timely patching as well as the need for a reliable and multi-layered security solution that can block the underlying malicious tool," Kubovič said.


26-27 February 2020 | Hilton Brisbane

Connecting the region’s leading data analytics professionals to drive and inspire your future strategy

Leading the data analytics division has never been easy, but now the challenge is on to remain ahead of the competition and reap the massive rewards as a strategic executive.

Do you want to leverage data governance as an enabler?Are you working at driving AI/ML implementation?

Want to stay abreast of data privacy and AI ethics requirements? Are you working hard to push predictive analytics to the limits?

With so much to keep on top of in such a rapidly changing technology space, collaboration is key to success. You don't need to struggle alone, network and share your struggles as well as your tips for success at CDAO Brisbane.

Discover how your peers have tackled the very same issues you face daily. Network with over 140 of your peers and hear from the leading professionals in your industry. Leverage this community of data and analytics enthusiasts to advance your strategy to the next level.

Download the Agenda to find out more


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.



Recent Comments